Server pool Kerberos authentication scheme
a server pool and authentication scheme technology, applied in the field of server pool kerberos authentication scheme, can solve the problems of reducing the security of the server pool, increasing the manageability of the server,
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In the following detailed description, numerous details are set forth in order to provide a thorough understanding of the present disclosed subject matter. However, it will be understood by those skilled in the art that the disclosed subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as to not obscure the disclosed subject matter.
[0020] Kerberos is a trusted third-party authentication protocol designed for client / server interactions. J. Kohl and B. Neuman, “The Kerberos network authentication service (version 5),” RFC-1510, 1993. Hereafter, a service that is substantially in compliance with the above Kerberos specification, its derivatives, or antecedents is simply referred to as “Kerberos.” This includes imperfect or corrupted implementations.
[0021]FIG. 2 is a flowchart illustrating an embodiment of a technique for generating a Service Ticket to fa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


